Resources

Security Review Packet

ISMS Scope Statement

A short security review artifact describing how to frame an information security management system scope for teams evaluating AI governance and privacy controls.

Procurement artifactSecurity, procurement, and compliance teams reviewing Remova or documenting their own control boundary.
Download the ISMS scope PDF

What this resource covers

  • What an ISMS scope statement should clarify before a vendor review starts.
  • How to distinguish product controls, operational controls, and customer responsibilities.
  • Which follow-up questions help security teams avoid vague platform claims.

Why scope matters

Security review gets muddy when a vendor says a control exists but nobody knows where it applies. A scope statement narrows the conversation: systems, people, data types, support processes, and boundaries. That makes procurement faster and keeps technical reviewers from chasing irrelevant proof.

Use it as a question list

This artifact is most useful when paired with a live review. Ask which systems process customer data, which subprocessors are in scope, how logs are retained, what administrators can see, and which responsibilities stay with the customer. Good answers should be specific enough to map into a risk register.

Where it fits in AI governance

AI governance depends on more than model behavior. Identity, retention, logging, data minimization, and incident handling all sit around the model call. A clear scope statement helps buyers understand which controls are part of the product and which controls belong in their own operating process.

Before you use the PDF

  • Confirm which environments and support processes are included in the stated scope.
  • Ask how customer data, prompt data, logs, and generated files are handled.
  • Map the scope to procurement requirements before requesting evidence.
  • Keep customer responsibilities explicit so rollout assumptions do not drift.